final Program > june 22th
Time
|
Tuesday, June 22nd
|
13:40 - 14:00 (GMT+01)
:40 - :00 ()
|
Welcome/Opening
|
14:00 - 14:45 (GMT+01)
:00 - :45 ()
|
Keynote I: Tzi-cker Chiueh
Chair : Yennun Huang
A Low-cost Fault Corrector for Deep Neural Networks through Range Restriction Memory state-preserving fault tolerance (MPFT) enables a running process to continue to run without disruption in spite of any failure of the underlying hardware machine or operating system, and is built on the idea of continuous virtual machine migration and epoch-based execution model. Although there has been a commercial implementation of MPFT for some time, its real-world use is not as wide-spread as expected, mainly because its serious performance penalty. In this talk, I will first go over the main limitations of existing MPFT implementations, and then describe an open-source implementation of MPFT that not only supports all basic MPFT functionalities, but also removes all of these limitations.
|
14:50 - 15:35 (GMT+01)
:50 - :35 ()
|
Best Paper Candidates Chair : Paulo Verissimo Three papers have been selected for presentation in the "Best paper candidates" session on June 22nd. At the end of this session, each registered attendee will have the right to participate in an online Zoom ballot to select the best paper award winner. A single vote will be allowed per registered participant. The voting will remain open till June 22nd 17:00 (GMT+1).
The winner will be announced at the "Award Announcements and Recognition" session on June 24th. In case of a tie, all best paper candidates receiving the most votes will be declared best paper award winners.
A Low-cost Fault Corrector for Deep Neural Networks through Range Restriction
Zitao Chen (University of British Columbia), Guanpeng Li (University of Iowa), Karthik Pattabiraman (University of British Columbia)
Toward Intrusion Tolerance as a Service: Confidentiality in Partially Cloud-Based BFT Systems
Maher Khan (University of Pittsburgh), Amy Babay (University of Pittsburgh)
PID-Piper: Recovering Robotic Vehicles from Physical Attacks
Pritam Dash (University of British Columbia), Guanpeng Li (University of Iowa), Zitao Chen (University of British Columbia), Mehdi Karimibiuki (University of British Columbia), Karthik Pattabiraman (University of British Columbia) |
15:40 - 15:55 (GMT+01)
:40 - :55 ()
|
Carter Award Presentation
Chair : Karthik Pattabiraman
Winner :
|
Victor van der Veen, Vrije Universiteit Amsterdam, NL
PhD Dissertation title: When Memory Serves Not So Well: Memory Errors 30 Years Later
Defense date: October 24, 2019
Thesis Advisor: Herbert Bos and Giuffrida (Vrije Universiteit Amsterdam, NL)
|
|
16:00 - 16:45 (GMT+01)
:00 - :45 ()
|
I1 - Dependability Testing and Estimation Methods
Chair : Fred Lin, Facebook
SERMiner : A framework for early-stage reliability estimation for IBM processors
Karthik Swaminathan, Ramon Bertran, Hans Jacobson, Pradip Bose, Matthias Pflanz and Doug Balazich.
AMD EPYC™ 7002 Series – A Processor with Improved Soft Error Resilience
Cristian Constantinescu.
The Importance of Safety Invariants in Robustness Testing Autonomy Systems
Milda Zizyte, Casidhe Hutchison, Raewyn Duvall, Claire Le Goues and Philip Koopman.
|
16:00 - 16:45 (GMT+01)
:00 - :45 ()
|
R1 - Dependability for Machine Learning Chair : Paolo Rech
GARFIELD: System Support for Byzantine Machine Learning
Rachid Guerraoui (EPFL), Arsany Guirguis (EPFL), Jérémy Plassmann (EPFL), Anton Ragot (EPFL), Sébastien Rouault (EPFL) Plinius: Secure and Persistent Machine Learning Model Training
Peterson Yuhala (University of Neuchâtel), Pascal Felber (University of Neuchâtel), Valerio Schiavoni (University of Neuchâtel), Alain Tchana (ENS Lyon; Inria)
Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN
Bedeuro Kim (University of Sungkyunkwan, CSIRO’s Data61), Alsharif Abuadbba (CSIRO’s Data61, Cybersecurity CRC), Yansong Gao (CSIRO’s Data61, Nanjing University of Science and Technology), Yifeng Zheng (CSIRO’s Data61, Harbin Institute of Technology), Muhammad Ejaz Ahmed (CSIRO’s Data61), Surya Nepal (CSIRO’s Data61, Cybersecurity CRC), Hyoungshick Kim (University of Sungkyunkwan, CSIRO’s Data61)
MILR: Mathematically Induced Layer Recovery for Plaintext Space Error Correction of CNNs
Jonathan Ponader (University of Central Florida), Kyle Thomas (University of Central Florida), Yan Solihin (University of Central Florida), Sandip Kundu (University of Massachusetts Amherst) |
16:00 - 16:45 (GMT+01)
:00 - :45 ()
|
R2 - Networking Chair : Amy Babay
Fast IPv6 Network Periphery Discovery and Security Implications
Xiang Li (Tsinghua University; Beijing National Research Center for Information Science and Technology (BNRist)), Baojun Liu (Tsinghua University), Xiaofeng Zheng (Tsinghua University; QI-ANXIN Technology Research Institute), Haixin Duan (Tsinghua University; Beijing National Research Center for Information Science and Technology (BNRist); QI-ANXIN Technology Research Institute), Qi Li (Tsinghua University), Youjun Huang (Tsinghua University) A Comprehensive Study of Bugs in Software Defined Networks
Ayush Bhardwaj (Brown University), Zhenyu Zhou (Duke University), Theophilus A. Benson (Brown University)
Enabling Novel Interconnection Agreements with Path-Aware Network Architectures
Simon Scherrer (ETH Zurich), Markus Legner (ETH Zurich), Adrian Perrig (ETH Zurich),
Stefan Schmid (University of Vienna)
Self-Healing Protocol: Repairing Schedules Online after Link Failures in Time-Triggered Networks
Francisco Pozo (Westermo Network Technologies AB), Guillermo Rodriguez-Navas (Nokia Bell Labs), Hans Hansson (Mälardalen University)
|
16:55 - 17:40 (GMT+01)
:55 - :40 ()
|
R3 - Attacks, Vulnerabilities, and Patches Chair : Marco Vieira
The Master and Parasite Attack
Lukas Baumann (Fraunhofer SIT), Elias Heftrig (Fraunhofer SIT), Haya Shulman (Fraunhofer SIT), Michael Waidner (Fraunhofer SIT) PatchDB: A Large-Scale Security Patch Dataset
Xinda Wang (George Mason University), Shu Wang (George Mason University), Pengbin Feng (George Mason University), Kun Sun (George Mason University), Sushil Jajodia (George Mason University)
PDGraph: A Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities
Qiang Li (Beijing JiaoTong University), Jinke Song (Beijing JiaoTong University), Dawei Tan (Beijing JiaoTong University), Haining Wang (Virginia Tech), Jiqiang Liu (Beijing JiaoTong University)
OctoPoCs: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept
Seongkyeong Kwon (Korea University), Seunghoon Woo (Korea University), Gangmo Seong (Korea University),Heejo Lee (Korea University)
|
16:55 - 17:40 (GMT+01)
:55 - :40 ()
|
R4 - Systems Dependability Chair :Cheng Li
NVCache: A Plug-and-Play NVMM-based I/O booster for Legacy Systems
Rémi Dulong (University of Neuchâtel), Rafael Pires (Swiss Federal Institute of Technology in Lausanne), Andreia Correia (University of Neuchâtel), Valerio Schiavoni (University of Neuchâtel), Pedro Ramalhete (Cisco Systems), Pascal Felber (University of Neuchâtel), Gaël Thomas (Télécom SudParis/Institut Polytechnique de Paris) K2: Reading Quickly from Storage Across Many Datacenters
Khiem Ngo (Princeton University), Haonan Lu (Princeton University, Microsoft Research), Wyatt Lloyd (Princeton University)
Horus: Non-intrusive Causal Analysis of Distributed Systems Logs
Francisco Neves (INESC TEC; U. Minho), Nuno Machado (Amazon; INESC TEC), Ricardo Vilaça (INESC TEC; U. Minho), José Pereira (INESC TEC; U. Minho)
|
Loading...
|